lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <871wmpgsua.fsf@sycorax.lbl.gov>
Date:	Sun, 24 Dec 2006 08:29:49 -0800
From:	Alex Romosan <romosan@...orax.lbl.gov>
To:	Jiri Slaby <jirislaby@...il.com>
Cc:	linux-kernel@...r.kernel.org
Subject: Re: linux 2.6.20-rc1: kernel BUG at fs/buffer.c:1235!

Jiri Slaby <jirislaby@...il.com> writes:

> Alex Romosan wrote:
>> this is on a thinkpad t40, not sure if it means anything, but here it goes:
>> 
>> kernel: kernel BUG at fs/buffer.c:1235!
>> kernel: invalid opcode: 0000 [#1]
>> kernel: PREEMPT 
>> kernel: Modules linked in: radeon drm binfmt_misc nfs sd_mod scsi_mod nfsd exportfs lockd sunrpc autofs4 pcmcia firmware_class joydev irtty_sir sir_dev nsc_ircc irda crc_ccitt parport_pc parport ehci_hcd uhci_hcd usbcore aes_i586 airo nls_iso8859_1 ntfs yenta_socket rsrc_nonstatic pcmcia_core
>> kernel: CPU:    0
>> kernel: EIP:    0060:[<c016ad06>]    Not tainted VLI
>> kernel: EFLAGS: 00010046   (2.6.20-rc1 #215)
>
> Could you test 2.6.20-rc2? It's probably fixed there.

i switched to 2.6.20-rc2 last night. we'll see if it happens again.

--alex--

-- 
| I believe the moment is at hand when, by a paranoiac and active |
|  advance of the mind, it will be possible (simultaneously with  |
|  automatism and other passive states) to systematize confusion  |
|  and thus to help to discredit completely the world of reality. |
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ